Movatterモバイル変換


[0]ホーム

URL:


US20070214151A1 - Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics - Google Patents

Method and System for Processing a Stream of Information From a Computer Network Using Node Based Reputation Characteristics
Download PDF

Info

Publication number
US20070214151A1
US20070214151A1US11/550,393US55039306AUS2007214151A1US 20070214151 A1US20070214151 A1US 20070214151A1US 55039306 AUS55039306 AUS 55039306AUS 2007214151 A1US2007214151 A1US 2007214151A1
Authority
US
United States
Prior art keywords
submitter
reputation
information
nodes
knowledge base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/550,393
Other versions
US8763113B2 (en
Inventor
Scott Thomas
David G. Jones
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ThreatMetrix Pty Ltd
Original Assignee
ThreatMetrix Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/550,393priorityCriticalpatent/US8763113B2/en
Application filed by ThreatMetrix Pty LtdfiledCriticalThreatMetrix Pty Ltd
Assigned to THREATMETRIX PTY LTDreassignmentTHREATMETRIX PTY LTDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JONES, DAVID G., THOMAS, SCOTT
Publication of US20070214151A1publicationCriticalpatent/US20070214151A1/en
Priority to US12/196,256prioritypatent/US9444839B1/en
Priority to US13/442,857prioritypatent/US9332020B2/en
Priority to US14/281,887prioritypatent/US10142369B2/en
Publication of US8763113B2publicationCriticalpatent/US8763113B2/en
Application grantedgrantedCritical
Priority to US14/455,874prioritypatent/US9444835B2/en
Priority to US15/237,385prioritypatent/US10116677B2/en
Priority to US16/191,587prioritypatent/US10893073B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.

Description

Claims (35)

7. A method for processing a stream of information to determine a security level, the method comprising:
providing a knowledge base, the knowledge base having information about a plurality of nodes, each of the nodes numbered from 1 through N, each of the nodes being assigned a reputation characteristic numbered respectively from 1 through N, each of the reputation characteristics comprising one or more of a plurality of properties;
identifying a selected node from the plurality of nodes, the selected node being coupled to a network of computers;
requesting reputation information associated with the selected node through the network of computers;
deriving at least one of the reputation characteristics numbered from 1 through N of the selected node from the knowledge base;
transferring the reputation characteristic through the network of computers; and
processing information from a stream of data associated with the selected node within the plurality of nodes using a selection of at least one of a plurality of processes, the selected process being associated with the reputation characteristic of the selected node.
25. A method for creating a real time knowledge base of a plurality of nodes from a variety of submitters, the method comprising:
receiving first information about one or more nodes from a first submitter from a plurality of submitters numbered from 1 through N, the one or more nodes being associated respectively with one or more IP addresses on a world wide network of computers;
identifying a submitter reputation of the first submitter from a knowledge base, the submitter being one of the plurality of submitters numbered from 1 through N;
associating a node reputation of the node based upon at least the reputation of the first submitter and first submitted information from the first submitter;
storing the first submitted information in a first portion of the knowledge base; and
repeating the receiving, identifying, associating, and storing for second information from a second submitter.
US11/550,3932005-11-282006-10-17Method and system for processing a stream of information from a computer network using node based reputation characteristicsActive2029-04-24US8763113B2 (en)

Priority Applications (7)

Application NumberPriority DateFiling DateTitle
US11/550,393US8763113B2 (en)2005-11-282006-10-17Method and system for processing a stream of information from a computer network using node based reputation characteristics
US12/196,256US9444839B1 (en)2006-10-172008-08-21Method and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US13/442,857US9332020B2 (en)2006-10-172012-04-10Method for tracking machines on a network using multivariable fingerprinting of passively available information
US14/281,887US10142369B2 (en)2005-11-282014-05-19Method and system for processing a stream of information from a computer network using node based reputation characteristics
US14/455,874US9444835B2 (en)2006-10-172014-08-08Method for tracking machines on a network using multivariable fingerprinting of passively available information
US15/237,385US10116677B2 (en)2006-10-172016-08-15Method and system for uniquely identifying a user computer in real time using a plurality of processing parameters and servers
US16/191,587US10893073B2 (en)2005-11-282018-11-15Method and system for processing a stream of information from a computer network using node based reputation characteristics

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US74058505P2005-11-282005-11-28
US11/550,393US8763113B2 (en)2005-11-282006-10-17Method and system for processing a stream of information from a computer network using node based reputation characteristics

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/281,887ContinuationUS10142369B2 (en)2005-11-282014-05-19Method and system for processing a stream of information from a computer network using node based reputation characteristics

Publications (2)

Publication NumberPublication Date
US20070214151A1true US20070214151A1 (en)2007-09-13
US8763113B2 US8763113B2 (en)2014-06-24

Family

ID=38480165

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US11/550,393Active2029-04-24US8763113B2 (en)2005-11-282006-10-17Method and system for processing a stream of information from a computer network using node based reputation characteristics
US14/281,887ActiveUS10142369B2 (en)2005-11-282014-05-19Method and system for processing a stream of information from a computer network using node based reputation characteristics
US16/191,587Active2027-02-25US10893073B2 (en)2005-11-282018-11-15Method and system for processing a stream of information from a computer network using node based reputation characteristics

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/281,887ActiveUS10142369B2 (en)2005-11-282014-05-19Method and system for processing a stream of information from a computer network using node based reputation characteristics
US16/191,587Active2027-02-25US10893073B2 (en)2005-11-282018-11-15Method and system for processing a stream of information from a computer network using node based reputation characteristics

Country Status (1)

CountryLink
US (3)US8763113B2 (en)

Cited By (79)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070124801A1 (en)*2005-11-282007-05-31Threatmetrix Pty LtdMethod and System for Tracking Machines on a Network Using Fuzzy Guid Technology
US20080005037A1 (en)*2006-06-192008-01-03Ayman HammadConsumer authentication system and method
US20080172741A1 (en)*2007-01-162008-07-17International Business Machines CorporationMethod and Apparatus for Detecting Computer Fraud
US20080209552A1 (en)*2007-02-282008-08-28Microsoft CorporationIdentifying potentially offending content using associations
US20080289047A1 (en)*2007-05-142008-11-20Cisco Technology, Inc.Anti-content spoofing (acs)
US20080319904A1 (en)*2007-06-252008-12-25Mark CarlsonSeeding challenges for payment transactions
US20090119182A1 (en)*2007-11-012009-05-07Alcatel LucentIdentity verification for secure e-commerce transactions
US20090187988A1 (en)*2008-01-182009-07-23Microsoft CorporationCross-network reputation for online services
US20090204808A1 (en)*2002-05-152009-08-13Microsoft CorporationSession Key Security Protocol
US20090268027A1 (en)*2008-04-232009-10-29Sanyo Electric Co., Ltd.Driving Assistance System And Vehicle
GB2466922A (en)*2009-01-082010-07-14Martin Paul NorthMonitoring behaviour in a network to determine chance that communication is undesirable
US20100217717A1 (en)*2009-02-242010-08-26Devonwood Logistics, Inc.System and method for organizing and presenting evidence relevant to a set of statements
US20110185423A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US20110185429A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for proactive detection of malicious shared libraries via a remote reputation system
US20110185428A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for protection against unknown malicious activities observed by applications downloaded from pre-classified domains
US20110258201A1 (en)*2008-05-282011-10-20Barracuda Inc.Multilevel intent analysis apparatus & method for email filtration
US8045458B2 (en)*2007-11-082011-10-25Mcafee, Inc.Prioritizing network traffic
US8121956B2 (en)2007-06-252012-02-21Visa U.S.A. Inc.Cardless challenge systems and methods
US8176178B2 (en)2007-01-292012-05-08Threatmetrix Pty LtdMethod for tracking machines on a network using multivariable fingerprinting of passively available information
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US20120174228A1 (en)*2010-12-292012-07-05Anastasios GiakouminakisMethods and systems for integrating reconnaissance with security assessments for computing networks
US8239668B1 (en)*2009-04-152012-08-07Trend Micro IncorporatedComputer security threat data collection and aggregation with user privacy protection
US8474039B2 (en)2010-01-272013-06-25Mcafee, Inc.System and method for proactive detection and repair of malware memory infection via a remote memory reputation system
US8533118B2 (en)2008-11-062013-09-10Visa International Service AssociationOnline challenge-response
US8549611B2 (en)2002-03-082013-10-01Mcafee, Inc.Systems and methods for classification of messaging entities
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US8578051B2 (en)2007-01-242013-11-05Mcafee, Inc.Reputation based load balancing
US8578480B2 (en)2002-03-082013-11-05Mcafee, Inc.Systems and methods for identifying potentially malicious messages
US8589503B2 (en)2008-04-042013-11-19Mcafee, Inc.Prioritizing network traffic
US8621638B2 (en)2010-05-142013-12-31Mcafee, Inc.Systems and methods for classification of messaging entities
US8621559B2 (en)2007-11-062013-12-31Mcafee, Inc.Adjusting filter or classification control settings
US8635690B2 (en)2004-11-052014-01-21Mcafee, Inc.Reputation based message processing
US8661547B1 (en)*2012-12-252014-02-25Kaspersky Lab ZaoSystem and method for protecting cloud services from unauthorized access and malware attacks
CN103618720A (en)*2013-11-292014-03-05华中科技大学Method and system for Trojan network communication detecting and evidence obtaining
US20140101753A1 (en)*2007-01-172014-04-10International Business Machines CorporationRisk Adaptive Information Flow Based Access Control
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US8817984B2 (en)2011-02-032014-08-26mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US9147071B2 (en)2010-07-202015-09-29Mcafee, Inc.System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system
US9344371B1 (en)*2008-06-302016-05-17Amazon Technologies, Inc.Dynamic throttling systems and services
US9444839B1 (en)2006-10-172016-09-13Threatmetrix Pty LtdMethod and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US9536089B2 (en)2010-09-022017-01-03Mcafee, Inc.Atomic detection and repair of kernel memory
US9948629B2 (en)2009-03-252018-04-17The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US10021099B2 (en)2012-03-222018-07-10The 41st Paramter, Inc.Methods and systems for persistent cross-application mobile device identification
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10089679B2 (en)2006-03-312018-10-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10142369B2 (en)2005-11-282018-11-27Threatmetrix Pty LtdMethod and system for processing a stream of information from a computer network using node based reputation characteristics
US10187407B1 (en)*2013-02-082019-01-22Cofense Inc.Collaborative phishing attack detection
US10397267B2 (en)*2015-07-022019-08-27Reliaquest Holdings, LlcThreat intelligence system and method
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US10726151B2 (en)2005-12-162020-07-28The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US10764298B1 (en)*2020-02-262020-09-01BitSight Technologies, Inc.Systems and methods for improving a security profile of an entity based on peer security profiles
US10791140B1 (en)2020-01-292020-09-29BitSight Technologies, Inc.Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US10848382B1 (en)2019-09-262020-11-24BitSight Technologies, Inc.Systems and methods for network asset discovery and association thereof with entities
US10893067B1 (en)2020-01-312021-01-12BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US10893021B2 (en)2017-06-222021-01-12BitSight Technologies, Inc.Methods for mapping IP addresses and domains to organizations using user activity data
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US10999298B2 (en)2004-03-022021-05-04The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US11010468B1 (en)2012-03-012021-05-18The 41St Parameter, Inc.Methods and systems for fraud containment
US11023585B1 (en)2020-05-272021-06-01BitSight Technologies, Inc.Systems and methods for managing cybersecurity alerts
US11030325B2 (en)2019-07-172021-06-08BitSight Technologies, Inc.Systems and methods for generating security improvement plans for entities
US11032244B2 (en)2019-09-302021-06-08BitSight Technologies, Inc.Systems and methods for determining asset importance in security risk management
US11063920B2 (en)2011-02-032021-07-13mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US11126723B2 (en)2018-10-252021-09-21BitSight Technologies, Inc.Systems and methods for remote detection of software through browser webinjects
US11200323B2 (en)2018-10-172021-12-14BitSight Technologies, Inc.Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US11245667B2 (en)2018-10-232022-02-08Akamai Technologies, Inc.Network security system with enhanced traffic analysis based on feedback loop and low-risk domain identification
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information
US11652834B2 (en)2013-09-092023-05-16BitSight Technologies, Inc.Methods for using organizational behavior for risk ratings
CN116192441A (en)*2022-12-122023-05-30深圳崎点数据有限公司Digital park emergency treatment system and method
US11671441B2 (en)2018-04-172023-06-06BitSight Technologies, Inc.Systems and methods for external detection of misconfigured systems
US11689555B2 (en)2020-12-112023-06-27BitSight Technologies, Inc.Systems and methods for cybersecurity risk mitigation and management
US11770401B2 (en)2018-03-122023-09-26BitSight Technologies, Inc.Correlated risk in cybersecurity
US11777976B2 (en)2010-09-242023-10-03BitSight Technologies, Inc.Information technology security assessment system
US12079347B2 (en)2021-03-312024-09-03BitSight Technologies, Inc.Systems and methods for assessing cybersecurity risk in a work from home environment
US12282564B2 (en)2022-01-312025-04-22BitSight Technologies, Inc.Systems and methods for assessment of cyber resilience
US12353563B2 (en)2021-07-012025-07-08BitSight Technologies, Inc.Systems and methods for accelerating cybersecurity assessments
US12425437B2 (en)2021-09-172025-09-23BitSight Technologies, Inc.Systems and methods for precomputation of digital asset inventories

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6979504B2 (en)2001-07-252005-12-27Ballard Power Systems Inc.Fuel cell system automatic power switching method and apparatus
US10083295B2 (en)*2014-12-232018-09-25Mcafee, LlcSystem and method to combine multiple reputations
US10708297B2 (en)2017-08-252020-07-07Ecrime Management Strategies, Inc.Security system for detection and mitigation of malicious communications
US10956204B1 (en)2019-10-142021-03-23International Business Machines CorporationFree-riding node identification for blockchain
CN112600788B (en)*2020-11-162021-10-26清华大学Node reputation evaluation method based on incomplete information dynamic game model
US12346909B2 (en)*2021-07-272025-07-01Synchrony BankUnique device identification system
CN113468201B (en)*2021-09-062021-11-02环球数科集团有限公司 A cross-channel data linkage update system based on resource element storage channel

Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020138582A1 (en)*2000-09-052002-09-26Mala ChandraMethods and apparatus providing electronic messages that are linked and aggregated
US20030140068A1 (en)*2001-11-262003-07-24Peter YeungArrangement, system and method relating to exchange of information
US20030188189A1 (en)*2002-03-272003-10-02Desai Anish P.Multi-level and multi-platform intrusion detection and response system
US20030223367A1 (en)*2002-03-292003-12-04Shay A. DavidMethods for identifying network traffic flows
US20040047324A1 (en)*2002-09-112004-03-11Diener Neil R.System and method for management of a shared frequency band using client--specific management techniques
US20060070128A1 (en)*2003-12-182006-03-30Honeywell International Inc.Intrusion detection report correlator and analyzer
US20060080657A1 (en)*2004-10-072006-04-13International Business Machines CorporationMethod and structure for autonomic application differentiation/specialization
US20060149708A1 (en)*2002-11-112006-07-06Lavine Steven DSearch method and system and system using the same
US7398310B1 (en)*2003-06-192008-07-08Cisco Technology Inc.Method and system for tracking entities in a computer network
US7461120B1 (en)*2002-07-092008-12-02Vignette CorporationMethod and system for identifying a visitor at a website server by requesting additional characteristic of a visitor computer from a visitor server
US7545748B1 (en)*2004-09-102009-06-09Packeteer, Inc.Classification and management of network traffic based on attributes orthogonal to explicit packet attributes
US7624274B1 (en)*2004-02-112009-11-24AOL LLC, a Delaware Limited CompanyDecreasing the fragility of duplicate document detecting algorithms
US7712134B1 (en)*2006-01-062010-05-04Narus, Inc.Method and apparatus for worm detection and containment in the internet core
US20110305160A1 (en)*2010-06-142011-12-15G2, Inc.System, device, and terminal for resolving an obfuscated network address of a network device within a network

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA2283080A1 (en)1997-01-131998-07-16John OvertonAutomated system for image archiving
US20050081059A1 (en)1997-07-242005-04-14Bandini Jean-Christophe DenisMethod and system for e-mail filtering
US6496824B1 (en)1999-02-192002-12-17Saar WilfSession management over a stateless protocol
US6826403B1 (en)2000-09-122004-11-30Phonepages Of Sweden AbMethod and system for identifying a user
US20020066034A1 (en)2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US6714970B1 (en)2000-10-262004-03-30International Business Machines CorporationProtecting open world wide web sites from known malicious users by diverting requests from malicious users to alias addresses for the protected sites
US7177917B2 (en)2000-12-272007-02-13Softwired AgScaleable message system
US7174566B2 (en)*2002-02-012007-02-06Intel CorporationIntegrated network intrusion detection
US7322044B2 (en)2002-06-032008-01-22Airdefense, Inc.Systems and methods for automated network policy exception detection and correction
US20040024867A1 (en)2002-06-282004-02-05Openwave Systems Inc.Method and apparatus for determination of device capabilities on a network
US7814542B1 (en)*2003-06-302010-10-12Cisco Technology, Inc.Network connection detection and throttling
US20050015365A1 (en)2003-07-162005-01-20Kavacheri Sathyanarayanan N.Hierarchical configuration attribute storage and retrieval
US20050076230A1 (en)2003-10-022005-04-07George RedenbaughFraud tracking cookie
US8095640B2 (en)*2003-12-122012-01-10Alcatel LucentDistributed architecture for real-time flow measurement at the network domain level
US7257580B2 (en)2004-02-242007-08-14International Business Machines CorporationMethod, system, and program for restricting modifications to allocations of computational resources
US8214875B2 (en)2004-02-262012-07-03Vmware, Inc.Network security policy enforcement using application session information and object attributes
US20050210027A1 (en)2004-03-162005-09-22International Business Machines CorporationMethods and apparatus for data stream clustering for abnormality monitoring
US20060004837A1 (en)2004-06-302006-01-05Genovker Victoria VAdvanced switching peer-to-peer protocol
US7748040B2 (en)2004-07-122010-06-29Architecture Technology CorporationAttack correlation using marked information
US7533265B2 (en)2004-07-142009-05-12Microsoft CorporationEstablishment of security context
US7493388B2 (en)2004-08-202009-02-17Bdna CorporationMethod and/or system for identifying information appliances
US8032937B2 (en)*2004-10-262011-10-04The Mitre CorporationMethod, apparatus, and computer program product for detecting computer worms in a network
US8065722B2 (en)2005-03-212011-11-22Wisconsin Alumni Research FoundationSemantically-aware network intrusion signature generator
JP4954979B2 (en)2005-04-292012-06-20オラクル・インターナショナル・コーポレイション Systems and methods for fraud monitoring, detection, and hierarchical user authentication
US7454790B2 (en)2005-05-232008-11-18Ut-Battelle, LlcMethod for detecting sophisticated cyber attacks
US20070011744A1 (en)2005-07-112007-01-11Cox CommunicationsMethods and systems for providing security from malicious software
US8955032B2 (en)2005-08-202015-02-10Riverbed Technology, Inc.Assessing network and device compliance with security policies
US8763113B2 (en)2005-11-282014-06-24Threatmetrix Pty LtdMethod and system for processing a stream of information from a computer network using node based reputation characteristics
US8141148B2 (en)2005-11-282012-03-20Threatmetrix Pty LtdMethod and system for tracking machines on a network using fuzzy GUID technology
US8745253B2 (en)2006-03-082014-06-03Alcatel LucentTriggering DHCP actions from IEEE 802.1x state changes
US8151327B2 (en)2006-03-312012-04-03The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10181135B2 (en)2006-07-182019-01-15At&T Intellectual Property I, L.P.Method and apparatus for presenting advertisements
US20080034424A1 (en)2006-07-202008-02-07Kevin OvercashSystem and method of preventing web applications threats
US20080047009A1 (en)2006-07-202008-02-21Kevin OvercashSystem and method of securing networks against applications threats
US7870612B2 (en)2006-09-112011-01-11Fujian Eastern Micropoint Info-Tech Co., LtdAntivirus protection system and method for computers
US9444839B1 (en)2006-10-172016-09-13Threatmetrix Pty LtdMethod and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US8176178B2 (en)2007-01-292012-05-08Threatmetrix Pty LtdMethod for tracking machines on a network using multivariable fingerprinting of passively available information
US8132233B2 (en)2007-02-052012-03-06Hewlett-Packard Development Company, L.P.Dynamic network access control method and apparatus
US8706914B2 (en)*2007-04-232014-04-22David D. DuchesneauComputing infrastructure
US8175578B2 (en)2007-05-072012-05-08Battelle Energy Alliance, LlcWireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
US7937336B1 (en)2007-06-292011-05-03Amazon Technologies, Inc.Predicting geographic location associated with network address
GB2461870B (en)2008-07-142012-02-29F Secure OyjMalware detection
US8863234B2 (en)*2008-08-062014-10-14The Boeing CompanyCollaborative security and decision making in a service-oriented environment
US20110131652A1 (en)2009-05-292011-06-02Autotrader.Com, Inc.Trained predictive services to interdict undesired website accesses
US8756684B2 (en)2010-03-012014-06-17Emc CorporationSystem and method for network security including detection of attacks through partner websites
US20130031042A1 (en)*2011-07-272013-01-31Sintayehu DehnieDistributed assured network system (DANS)
US8990948B2 (en)*2012-05-012015-03-24Taasera, Inc.Systems and methods for orchestrating runtime operational integrity

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020138582A1 (en)*2000-09-052002-09-26Mala ChandraMethods and apparatus providing electronic messages that are linked and aggregated
US20030140068A1 (en)*2001-11-262003-07-24Peter YeungArrangement, system and method relating to exchange of information
US20030188189A1 (en)*2002-03-272003-10-02Desai Anish P.Multi-level and multi-platform intrusion detection and response system
US20030223367A1 (en)*2002-03-292003-12-04Shay A. DavidMethods for identifying network traffic flows
US7461120B1 (en)*2002-07-092008-12-02Vignette CorporationMethod and system for identifying a visitor at a website server by requesting additional characteristic of a visitor computer from a visitor server
US20040047324A1 (en)*2002-09-112004-03-11Diener Neil R.System and method for management of a shared frequency band using client--specific management techniques
US20060149708A1 (en)*2002-11-112006-07-06Lavine Steven DSearch method and system and system using the same
US7398310B1 (en)*2003-06-192008-07-08Cisco Technology Inc.Method and system for tracking entities in a computer network
US20060070128A1 (en)*2003-12-182006-03-30Honeywell International Inc.Intrusion detection report correlator and analyzer
US7624274B1 (en)*2004-02-112009-11-24AOL LLC, a Delaware Limited CompanyDecreasing the fragility of duplicate document detecting algorithms
US7545748B1 (en)*2004-09-102009-06-09Packeteer, Inc.Classification and management of network traffic based on attributes orthogonal to explicit packet attributes
US20060080657A1 (en)*2004-10-072006-04-13International Business Machines CorporationMethod and structure for autonomic application differentiation/specialization
US7712134B1 (en)*2006-01-062010-05-04Narus, Inc.Method and apparatus for worm detection and containment in the internet core
US20110305160A1 (en)*2010-06-142011-12-15G2, Inc.System, device, and terminal for resolving an obfuscated network address of a network device within a network

Cited By (187)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8561167B2 (en)2002-03-082013-10-15Mcafee, Inc.Web reputation scoring
US8578480B2 (en)2002-03-082013-11-05Mcafee, Inc.Systems and methods for identifying potentially malicious messages
US8549611B2 (en)2002-03-082013-10-01Mcafee, Inc.Systems and methods for classification of messaging entities
US7971240B2 (en)2002-05-152011-06-28Microsoft CorporationSession key security protocol
US20090204808A1 (en)*2002-05-152009-08-13Microsoft CorporationSession Key Security Protocol
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US11238456B2 (en)2003-07-012022-02-01The 41St Parameter, Inc.Keystroke analysis
US10999298B2 (en)2004-03-022021-05-04The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US11683326B2 (en)2004-03-022023-06-20The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US8635690B2 (en)2004-11-052014-01-21Mcafee, Inc.Reputation based message processing
US10893073B2 (en)2005-11-282021-01-12Threatmetrix Pty LtdMethod and system for processing a stream of information from a computer network using node based reputation characteristics
US20070124801A1 (en)*2005-11-282007-05-31Threatmetrix Pty LtdMethod and System for Tracking Machines on a Network Using Fuzzy Guid Technology
US8141148B2 (en)2005-11-282012-03-20Threatmetrix Pty LtdMethod and system for tracking machines on a network using fuzzy GUID technology
US9449168B2 (en)2005-11-282016-09-20Threatmetrix Pty LtdMethod and system for tracking machines on a network using fuzzy guid technology
US8782783B2 (en)2005-11-282014-07-15Threatmetrix Pty LtdMethod and system for tracking machines on a network using fuzzy guid technology
US10142369B2 (en)2005-11-282018-11-27Threatmetrix Pty LtdMethod and system for processing a stream of information from a computer network using node based reputation characteristics
US10726151B2 (en)2005-12-162020-07-28The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US12079368B2 (en)2005-12-162024-09-03The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US12093992B2 (en)2006-03-312024-09-17The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US11195225B2 (en)2006-03-312021-12-07The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10535093B2 (en)2006-03-312020-01-14The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US11727471B2 (en)2006-03-312023-08-15The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en)2006-03-312018-10-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10089624B2 (en)2006-06-192018-10-02Visa U.S.A. Inc.Consumer authentication system and method
US11783326B2 (en)2006-06-192023-10-10Visa U.S.A. Inc.Transaction authentication using network
US20080005037A1 (en)*2006-06-192008-01-03Ayman HammadConsumer authentication system and method
US11107069B2 (en)2006-06-192021-08-31Visa U.S.A. Inc.Transaction authentication using network
US8135647B2 (en)2006-06-192012-03-13Visa U.S.A. Inc.Consumer authentication system and method
US11488150B2 (en)2006-06-192022-11-01Visa U.S.A. Inc.Consumer authentication system and method
US12002037B2 (en)2006-06-192024-06-04Visa U.S.A. Inc.Consumer authentication system and method
US9444835B2 (en)2006-10-172016-09-13Threatmetrix Pty LtdMethod for tracking machines on a network using multivariable fingerprinting of passively available information
US9332020B2 (en)2006-10-172016-05-03Threatmetrix Pty LtdMethod for tracking machines on a network using multivariable fingerprinting of passively available information
US9444839B1 (en)2006-10-172016-09-13Threatmetrix Pty LtdMethod and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US9083735B2 (en)*2007-01-162015-07-14International Business Machines CorporationMethod and apparatus for detecting computer fraud
US20120304295A1 (en)*2007-01-162012-11-29International Business Machines CorporationMethod and Apparatus for Detecting Computer Fraud
US9521161B2 (en)2007-01-162016-12-13International Business Machines CorporationMethod and apparatus for detecting computer fraud
US20080172741A1 (en)*2007-01-162008-07-17International Business Machines CorporationMethod and Apparatus for Detecting Computer Fraud
US9582674B2 (en)*2007-01-172017-02-28International Business Machines CorporationRisk adaptive information flow based access control
US20140101753A1 (en)*2007-01-172014-04-10International Business Machines CorporationRisk Adaptive Information Flow Based Access Control
US9009321B2 (en)2007-01-242015-04-14Mcafee, Inc.Multi-dimensional reputation scoring
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US10050917B2 (en)2007-01-242018-08-14Mcafee, LlcMulti-dimensional reputation scoring
US8578051B2 (en)2007-01-242013-11-05Mcafee, Inc.Reputation based load balancing
US9544272B2 (en)2007-01-242017-01-10Intel CorporationDetecting image spam
US8762537B2 (en)2007-01-242014-06-24Mcafee, Inc.Multi-dimensional reputation scoring
US8176178B2 (en)2007-01-292012-05-08Threatmetrix Pty LtdMethod for tracking machines on a network using multivariable fingerprinting of passively available information
US20080209552A1 (en)*2007-02-282008-08-28Microsoft CorporationIdentifying potentially offending content using associations
US8769673B2 (en)*2007-02-282014-07-01Microsoft CorporationIdentifying potentially offending content using associations
US8205255B2 (en)*2007-05-142012-06-19Cisco Technology, Inc.Anti-content spoofing (ACS)
US20080289047A1 (en)*2007-05-142008-11-20Cisco Technology, Inc.Anti-content spoofing (acs)
US20080319904A1 (en)*2007-06-252008-12-25Mark CarlsonSeeding challenges for payment transactions
US8121942B2 (en)2007-06-252012-02-21Visa U.S.A. Inc.Systems and methods for secure and transparent cardless transactions
US8380629B2 (en)2007-06-252013-02-19Visa U.S.A. Inc.Seeding challenges for payment transactions
US8706621B2 (en)2007-06-252014-04-22Visa U.S.A., Inc.Secure checkout and challenge systems and methods
US10262308B2 (en)2007-06-252019-04-16Visa U.S.A. Inc.Cardless challenge systems and methods
US8589291B2 (en)2007-06-252013-11-19Visa U.S.A. Inc.System and method utilizing device information
US8606700B2 (en)2007-06-252013-12-10Visa U.S.A., Inc.Systems and methods for secure and transparent cardless transactions
US8121956B2 (en)2007-06-252012-02-21Visa U.S.A. Inc.Cardless challenge systems and methods
US11481742B2 (en)2007-06-252022-10-25Visa U.S.A. Inc.Cardless challenge systems and methods
US8744958B2 (en)2007-06-252014-06-03Visa U. S. A. Inc.Systems and methods for secure and transparent cardless transactions
US20090119182A1 (en)*2007-11-012009-05-07Alcatel LucentIdentity verification for secure e-commerce transactions
US8315951B2 (en)*2007-11-012012-11-20Alcatel LucentIdentity verification for secure e-commerce transactions
US8621559B2 (en)2007-11-062013-12-31Mcafee, Inc.Adjusting filter or classification control settings
US8045458B2 (en)*2007-11-082011-10-25Mcafee, Inc.Prioritizing network traffic
US8484700B2 (en)2008-01-182013-07-09Microsoft CorporationCross-network reputation for online services
US20090187988A1 (en)*2008-01-182009-07-23Microsoft CorporationCross-network reputation for online services
US8001582B2 (en)*2008-01-182011-08-16Microsoft CorporationCross-network reputation for online services
US8606910B2 (en)2008-04-042013-12-10Mcafee, Inc.Prioritizing network traffic
US8589503B2 (en)2008-04-042013-11-19Mcafee, Inc.Prioritizing network traffic
US20090268027A1 (en)*2008-04-232009-10-29Sanyo Electric Co., Ltd.Driving Assistance System And Vehicle
US20110258201A1 (en)*2008-05-282011-10-20Barracuda Inc.Multilevel intent analysis apparatus & method for email filtration
US9344371B1 (en)*2008-06-302016-05-17Amazon Technologies, Inc.Dynamic throttling systems and services
US9729557B1 (en)*2008-06-302017-08-08Amazon Technologies, Inc.Dynamic throttling systems and services
US8762279B2 (en)2008-11-062014-06-24Visa International Service AssociationOnline challenge-response
US8533118B2 (en)2008-11-062013-09-10Visa International Service AssociationOnline challenge-response
US9898740B2 (en)2008-11-062018-02-20Visa International Service AssociationOnline challenge-response
GB2466922A (en)*2009-01-082010-07-14Martin Paul NorthMonitoring behaviour in a network to determine chance that communication is undesirable
US20100217717A1 (en)*2009-02-242010-08-26Devonwood Logistics, Inc.System and method for organizing and presenting evidence relevant to a set of statements
US10616201B2 (en)2009-03-252020-04-07The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9948629B2 (en)2009-03-252018-04-17The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US11750584B2 (en)2009-03-252023-09-05The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US12132719B2 (en)2009-03-252024-10-29The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9043587B1 (en)*2009-04-152015-05-26Trend Micro IncorporatedComputer security threat data collection and aggregation with user privacy protection
US8239668B1 (en)*2009-04-152012-08-07Trend Micro IncorporatedComputer security threat data collection and aggregation with user privacy protection
US9769200B2 (en)2010-01-272017-09-19Mcafee, Inc.Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US10740463B2 (en)2010-01-272020-08-11Mcafee, LlcMethod and system for proactive detection of malicious shared libraries via a remote reputation system
US20110185428A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for protection against unknown malicious activities observed by applications downloaded from pre-classified domains
US9886579B2 (en)2010-01-272018-02-06Mcafee, LlcMethod and system for proactive detection of malicious shared libraries via a remote reputation system
US8819826B2 (en)*2010-01-272014-08-26Mcafee, Inc.Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US8955131B2 (en)2010-01-272015-02-10Mcafee Inc.Method and system for proactive detection of malicious shared libraries via a remote reputation system
US9479530B2 (en)2010-01-272016-10-25Mcafee, Inc.Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US20110185429A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for proactive detection of malicious shared libraries via a remote reputation system
US8474039B2 (en)2010-01-272013-06-25Mcafee, Inc.System and method for proactive detection and repair of malware memory infection via a remote memory reputation system
US20110185423A1 (en)*2010-01-272011-07-28Mcafee, Inc.Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US8621638B2 (en)2010-05-142013-12-31Mcafee, Inc.Systems and methods for classification of messaging entities
US9147071B2 (en)2010-07-202015-09-29Mcafee, Inc.System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system
US9536089B2 (en)2010-09-022017-01-03Mcafee, Inc.Atomic detection and repair of kernel memory
US9703957B2 (en)2010-09-022017-07-11Mcafee, Inc.Atomic detection and repair of kernel memory
US11882146B2 (en)2010-09-242024-01-23BitSight Technologies, Inc.Information technology security assessment system
US12010137B2 (en)2010-09-242024-06-11BitSight Technologies, Inc.Information technology security assessment system
US11777976B2 (en)2010-09-242023-10-03BitSight Technologies, Inc.Information technology security assessment system
US10447709B2 (en)*2010-12-292019-10-15Rapid7, Inc.Methods and systems for integrating reconnaissance with security assessments for computing networks
US20120174228A1 (en)*2010-12-292012-07-05Anastasios GiakouminakisMethods and systems for integrating reconnaissance with security assessments for computing networks
US9722804B2 (en)2011-02-032017-08-01mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US9294448B2 (en)2011-02-032016-03-22mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US9559852B2 (en)2011-02-032017-01-31mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US11063920B2 (en)2011-02-032021-07-13mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US8817984B2 (en)2011-02-032014-08-26mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US10178076B2 (en)2011-02-032019-01-08mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US9979707B2 (en)2011-02-032018-05-22mSignia, Inc.Cryptographic security functions based on anticipated changes in dynamic minutiae
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information
US11886575B1 (en)2012-03-012024-01-30The 41St Parameter, Inc.Methods and systems for fraud containment
US12153666B1 (en)2012-03-012024-11-26The 41St Parameter, Inc.Methods and systems for fraud containment
US11010468B1 (en)2012-03-012021-05-18The 41St Parameter, Inc.Methods and systems for fraud containment
US10341344B2 (en)2012-03-222019-07-02The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US12058131B2 (en)2012-03-222024-08-06The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10021099B2 (en)2012-03-222018-07-10The 41st Paramter, Inc.Methods and systems for persistent cross-application mobile device identification
US11683306B2 (en)2012-03-222023-06-20The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10862889B2 (en)2012-03-222020-12-08The 41St Parameter, Inc.Methods and systems for persistent cross application mobile device identification
US11301860B2 (en)2012-08-022022-04-12The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US12430651B2 (en)2012-08-022025-09-30The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US12002053B2 (en)2012-08-022024-06-04The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US10395252B2 (en)2012-11-142019-08-27The 41St Parameter, Inc.Systems and methods of global identification
US11410179B2 (en)2012-11-142022-08-09The 41St Parameter, Inc.Systems and methods of global identification
US11922423B2 (en)2012-11-142024-03-05The 41St Parameter, Inc.Systems and methods of global identification
US10853813B2 (en)2012-11-142020-12-01The 41St Parameter, Inc.Systems and methods of global identification
US8661547B1 (en)*2012-12-252014-02-25Kaspersky Lab ZaoSystem and method for protecting cloud services from unauthorized access and malware attacks
US8819774B2 (en)2012-12-252014-08-26Kaspersky Lab ZaoSystem and method for protecting cloud services from unauthorized access and malware attacks
US10187407B1 (en)*2013-02-082019-01-22Cofense Inc.Collaborative phishing attack detection
US10819744B1 (en)*2013-02-082020-10-27Cofense IncCollaborative phishing attack detection
US12045736B1 (en)2013-08-302024-07-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US12380341B1 (en)2013-08-302025-08-05The 41St Parameter, Inc.System and method for device identification and uniqueness
US11657299B1 (en)2013-08-302023-05-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US11652834B2 (en)2013-09-092023-05-16BitSight Technologies, Inc.Methods for using organizational behavior for risk ratings
CN103618720A (en)*2013-11-292014-03-05华中科技大学Method and system for Trojan network communication detecting and evidence obtaining
US10728350B1 (en)2014-10-142020-07-28The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11895204B1 (en)2014-10-142024-02-06The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11240326B1 (en)2014-10-142022-02-01The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US12301685B1 (en)2014-10-142025-05-13The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US12120145B2 (en)2015-07-022024-10-15Reliaquest Holdings, LlcThreat intelligence system and method
US11418536B2 (en)2015-07-022022-08-16Reliaquest Holdings, LlcThreat intelligence system and method
US10397267B2 (en)*2015-07-022019-08-27Reliaquest Holdings, LlcThreat intelligence system and method
US11252181B2 (en)2015-07-022022-02-15Reliaquest Holdings, LlcThreat intelligence system and method
US11627109B2 (en)2017-06-222023-04-11BitSight Technologies, Inc.Methods for mapping IP addresses and domains to organizations using user activity data
US10893021B2 (en)2017-06-222021-01-12BitSight Technologies, Inc.Methods for mapping IP addresses and domains to organizations using user activity data
US12273367B2 (en)2018-03-122025-04-08BitSight Technologies, Inc.Correlated risk in cybersecurity
US11770401B2 (en)2018-03-122023-09-26BitSight Technologies, Inc.Correlated risk in cybersecurity
US11671441B2 (en)2018-04-172023-06-06BitSight Technologies, Inc.Systems and methods for external detection of misconfigured systems
US11783052B2 (en)2018-10-172023-10-10BitSight Technologies, Inc.Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US11200323B2 (en)2018-10-172021-12-14BitSight Technologies, Inc.Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US11310201B2 (en)*2018-10-232022-04-19Akamai Technologies, Inc.Network security system with enhanced traffic analysis based on feedback loop
US11245667B2 (en)2018-10-232022-02-08Akamai Technologies, Inc.Network security system with enhanced traffic analysis based on feedback loop and low-risk domain identification
US11126723B2 (en)2018-10-252021-09-21BitSight Technologies, Inc.Systems and methods for remote detection of software through browser webinjects
US11727114B2 (en)2018-10-252023-08-15BitSight Technologies, Inc.Systems and methods for remote detection of software through browser webinjects
US12099605B2 (en)2018-10-252024-09-24BitSight Technologies, Inc.Systems and methods for remote detection of software through browser webinjects
US11030325B2 (en)2019-07-172021-06-08BitSight Technologies, Inc.Systems and methods for generating security improvement plans for entities
US11675912B2 (en)2019-07-172023-06-13BitSight Technologies, Inc.Systems and methods for generating security improvement plans for entities
US12223060B2 (en)2019-07-172025-02-11BitSight Technologies, Inc.Systems and methods for generating security improvement plans for entities
US11329878B2 (en)2019-09-262022-05-10BitSight Technologies, Inc.Systems and methods for network asset discovery and association thereof with entities
US10848382B1 (en)2019-09-262020-11-24BitSight Technologies, Inc.Systems and methods for network asset discovery and association thereof with entities
US12348485B2 (en)2019-09-302025-07-01BitSight Technologies, Inc.Systems and methods for determining asset importance in security risk management
US11949655B2 (en)2019-09-302024-04-02BitSight Technologies, Inc.Systems and methods for determining asset importance in security risk management
US11032244B2 (en)2019-09-302021-06-08BitSight Technologies, Inc.Systems and methods for determining asset importance in security risk management
US11050779B1 (en)2020-01-292021-06-29BitSight Technologies, Inc.Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US10791140B1 (en)2020-01-292020-09-29BitSight Technologies, Inc.Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US12335297B2 (en)2020-01-312025-06-17BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US11595427B2 (en)2020-01-312023-02-28BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US11777983B2 (en)2020-01-312023-10-03BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US10893067B1 (en)2020-01-312021-01-12BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US11265330B2 (en)2020-02-262022-03-01BitSight Technologies, Inc.Systems and methods for improving a security profile of an entity based on peer security profiles
US10764298B1 (en)*2020-02-262020-09-01BitSight Technologies, Inc.Systems and methods for improving a security profile of an entity based on peer security profiles
US12099608B2 (en)2020-05-272024-09-24BitSight Technologies, Inc.Systems and methods for managing cybersecurity alerts
US11023585B1 (en)2020-05-272021-06-01BitSight Technologies, Inc.Systems and methods for managing cybersecurity alerts
US11720679B2 (en)2020-05-272023-08-08BitSight Technologies, Inc.Systems and methods for managing cybersecurity alerts
US12200006B2 (en)2020-12-112025-01-14BitSight Technologies, Inc.Systems and methods for cybersecurity risk mitigation and management
US11689555B2 (en)2020-12-112023-06-27BitSight Technologies, Inc.Systems and methods for cybersecurity risk mitigation and management
US12079347B2 (en)2021-03-312024-09-03BitSight Technologies, Inc.Systems and methods for assessing cybersecurity risk in a work from home environment
US12353563B2 (en)2021-07-012025-07-08BitSight Technologies, Inc.Systems and methods for accelerating cybersecurity assessments
US12425437B2 (en)2021-09-172025-09-23BitSight Technologies, Inc.Systems and methods for precomputation of digital asset inventories
US12282564B2 (en)2022-01-312025-04-22BitSight Technologies, Inc.Systems and methods for assessment of cyber resilience
CN116192441A (en)*2022-12-122023-05-30深圳崎点数据有限公司Digital park emergency treatment system and method

Also Published As

Publication numberPublication date
US8763113B2 (en)2014-06-24
US20150007253A1 (en)2015-01-01
US20190081987A1 (en)2019-03-14
US10893073B2 (en)2021-01-12
US10142369B2 (en)2018-11-27

Similar Documents

PublicationPublication DateTitle
US10893073B2 (en)Method and system for processing a stream of information from a computer network using node based reputation characteristics
US10505932B2 (en)Method and system for tracking machines on a network using fuzzy GUID technology
US12231458B2 (en)Cybersecurity risk assessment on an industry basis
US12381786B2 (en)System and method for monitoring data disclosures
US10972461B2 (en)Device aware network communication management
US10496994B2 (en)Enhanced authentication with dark web analytics
US8996669B2 (en)Internet improvement platform with learning module
US9185127B2 (en)Network protection service
US20080082662A1 (en)Method and apparatus for controlling access to network resources based on reputation
US20060230039A1 (en)Online identity tracking
WO2006119508A2 (en)Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
WO2024263997A1 (en)System and method for internet activity and health forecasting and internet noise analysis
PimenidisHolistic confidentiality in open networks

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:THREATMETRIX PTY LTD, AUSTRALIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:THOMAS, SCOTT;JONES, DAVID G.;REEL/FRAME:018411/0806

Effective date:20061011

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551)

Year of fee payment:4

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp